The IntelliSpace portal application utilizes .NET Remoting for its functionality. The vulnerability arises from the exploitation of port 755 through the deserialization vulnerability. After analyzing the configuration files, we observed that the server had set the TypeFilterLevel to Full which is dangerous as it can potentially lead to remote code execution using deserialization. This issue affects IntelliSpace Portal: 12 and prior.
History

Thu, 10 Apr 2025 16:00:00 +0000


Mon, 07 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 07 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Description The IntelliSpace portal application utilizes .NET Remoting for its functionality. The vulnerability arises from the exploitation of port 755 through the deserialization vulnerability. After analyzing the configuration files, we observed that the server had set the TypeFilterLevel to Full which is dangerous as it can potentially lead to remote code execution using deserialization. This issue affects IntelliSpace Portal: 12 and prior.
Title Unauthenticated Remote Code Execution via .NET Deserialization
Weaknesses CWE-502
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:P/AU:Y/R:U/V:C/RE:M/U:Green'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Philips

Published: 2025-04-07T16:05:46.457Z

Updated: 2025-04-10T15:41:29.106Z

Reserved: 2025-04-07T15:37:15.413Z

Link: CVE-2025-3425

cve-icon Vulnrichment

Updated: 2025-04-07T16:41:15.353Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-07T16:15:27.963

Modified: 2025-04-10T16:15:29.350

Link: CVE-2025-3425

cve-icon Redhat

No data.